2019 CYBER AWARENESS CHALLENGE:
KNOWLEDGE CHECK FLASHCARDS
EXAM PREPARATION GUIDE | 17 ITEMS
Q:A colleague complains about anxiety and exhaustion, makes coworkers
uncomfortable by asking excessive questions about classified projects, and complains about the credit card bills that his wife runs up. How many potential insider threat indicators does this employee display?
- or more indicators
Q:Within a secure area, you see an individual you do not know. Her badge is not
visible to you. What is the best course of action?Ask the individual to identify herself.
Q:When would be a good time to post your vacation location and dates on your
social networking website?When you return from your vacation.
Q:Which of the following is NOT a correct way to protect sensitive information?
Sensitive information may be stored on any password-protected system.Q:Which of the following should be reported as a potential security incident (in accordance with your Agency's insider threat policy)?A coworker brings a personal electronic device into prohibited areas.Q:After clicking on a link on a website, a box pops up and asks if you want to run an application. Is it okay to run it?No. Only allow mobile code to run from your organization or your organization's trusted sites.
Q:Upon connecting your Government- issued laptop to a public wireless connection, what should you immediately do?Connect to the Government Virtual Private Network (VPN).Q:What should you do if a reporter asks you about potentially classified information on the web?Neither confirm or deny the information is classified.
Q:Which of these is true of unclassified data?
It's classification level may rise when aggregated.
Q:Is it permitted to share an unclassified draft document with a non-DoD
professional discussion group?As long as the document is cleared for public release, you may share it outside of DoD.
Q:How should you protect your Common Access Card (CAC) or Personal Identity
Verification (PIV) card?Store it in a shielded sleeve to avoid chip cloning.
Q:What kind of information could reasonably be expected to cause serious damage
to national security in the event of unauthorized disclosure?Secret
Q:Which of the following should be reported as a potential security incident?
A coworker removes sensitive information without approval.Q:In setting up your personal social networking service account, what email address should you use?Your personal email address.
Q:Which of the following may be helpful to prevent inadvertent spillage?
Label all files, removable media, and subject headers with appropriate classification markings.
Q:Which of the following is NOT true concerning a computer labeled SECRET?
May be used on an unclassified network.
Q:Your DoD Common Access Card (CAC) has a Public Key Infrastructure (PKI)
token approves for access to the NIPRNET. In which situation below are you permitted to use your PKI token?On a NIPRNET system while using it for a PKI-required task
CONFIDENTIAL EXAM MATERIAL | Page 3